• O365 Email Spam, Phishing, & Malware Protection

    17
    1 Votes
    17 Posts
    3k Views
    kenK

    Thanks Scott for the nod. The Gartner peer reviews is a tough and well moderated reviews site which asks companies on each service how they perform in different areas. https://www.gartner.com/reviews/market/secure-email-gateways .
    I'd recommend picking a couple of services and contacting them for a trial. As you already have your list of requirements it shouldn't take long to narrow down who is relevant to you.

  • Rhcsa or Rhce Certification?

    28
    1 Votes
    28 Posts
    3k Views
    stacksofplatesS

    I have an RHCSA. I did the fast track class the week before. It was helpful for the test. I don't think it's a worthless test, but if you do manage RHEL systems all the time, it's fairly basic. You are expected to know basics with Bash like piping, redirection, regex, etc. I did find out about systemd-tmpfiles utility, which I didn't know existed.

    Here's the objectives:

    RHCSA exam candidates should be able to accomplish the tasks below without assistance. These have been grouped into several categories.

    Understand and use essential tools
    Access a shell prompt and issue commands with correct syntax
    Use input-output redirection (>, >>, |, 2>, etc.)
    Use grep and regular expressions to analyze text
    Access remote systems using ssh
    Log in and switch users in multiuser targets
    Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2
    Create and edit text files
    Create, delete, copy, and move files and directories
    Create hard and soft links
    List, set, and change standard ugo/rwx permissions
    Locate, read, and use system documentation including man, info, and files in /usr/share/doc
    Note: Red Hat may use applications during the exam that are not included in Red Hat Enterprise Linux for the purpose of evaluating candidate's abilities to meet this objective.

    Operate running systems
    Boot, reboot, and shut down a system normally
    Boot systems into different targets manually
    Interrupt the boot process in order to gain access to a system
    Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes
    Locate and interpret system log files and journals
    Access a virtual machine's console
    Start and stop virtual machines
    Start, stop, and check the status of network services
    Securely transfer files between systems
    Configure local storage
    List, create, delete partitions on MBR and GPT disks
    Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes
    Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label
    Add new partitions and logical volumes, and swap to a system non-destructively
    Create and configure file systems
    Create, mount, unmount, and use vfat, ext4, and xfs file systems
    Mount and unmount CIFS and NFS network file systems
    Extend existing logical volumes
    Create and configure set-GID directories for collaboration
    Create and manage Access Control Lists (ACLs)
    Diagnose and correct file permission problems
    Deploy, configure, and maintain systems
    Configure networking and hostname resolution statically or dynamically
    Schedule tasks using at and cron
    Start and stop services and configure services to start automatically at boot
    Configure systems to boot into a specific target automatically
    Install Red Hat Enterprise Linux automatically using Kickstart
    Configure a physical machine to host virtual guests
    Install Red Hat Enterprise Linux systems as virtual guests
    Configure systems to launch virtual machines at boot
    Configure network services to start automatically at boot
    Configure a system to use time services
    Install and update software packages from Red Hat Network, a remote repository, or from the local file system
    Update the kernel package appropriately to ensure a bootable system
    Modify the system bootloader
    Manage users and groups
    Create, delete, and modify local user accounts
    Change passwords and adjust password aging for local user accounts
    Create, delete, and modify local groups and group memberships
    Configure a system to use an existing authentication service for user and group information
    Manage security
    Configure firewall settings using firewall-config, firewall-cmd, or iptables
    Configure key-based authentication for SSH
    Set enforcing and permissive modes for SELinux
    List and identify SELinux file and process context
    Restore default file contexts
    Use boolean settings to modify system SELinux settings
    Diagnose and address routine SELinux policy violations
    Red Hat reserves the right to add, modify, and remove objectives. Such changes will be made public in advance through revisions to this document.

  • Options for deploying standardized image to desktop & laptops?

    29
    1 Votes
    29 Posts
    4k Views
    S

    @aaronstuder Hey Aaron - yep, I stated in my previous post that it was strictly for testing purposes (to determine if Macrium was going to work for me or not). And as Dustin stated, I ended up going with FOG anyway.

  • Active Directory Malware Defense

    6
    1 Votes
    6 Posts
    787 Views
    s.hacklemanS

    @scottalanmiller I sat down when this was first posted and watched the whole thing. I know the future is heading in this direction, I guess it didn't sit in until witnessing it first hand and seeing how real a threat like this can be.

  • Large file sharing to, from and within mainland China

    96
    1 Votes
    96 Posts
    10k Views
    Emad RE

    @scottalanmiller @JaredBusch

    I know my options, either Windows server acting as CA or OpenSSL in Linux, to be honest both routes was difficult to setup and requires a VM to be running at all times, to be the point I said screw it let them click the Advanced button and proceed to the site.

    Cause encryption is occurring, with the self created ssl key + cert.

    And our infrastructure is bit limited to be honest, so each VM has to be really needed to open one.

    And the theoretical issue of 0.00001% of someone hijacking the server and do Man in the middle attack by routing to his SSL keys + cert is out of the park, if there is someone there with I.T skills I will pay him to help me.

  • Where to start?

    37
    1 Votes
    37 Posts
    7k Views
    Emad RE

    Start with old Desktop with Virtualization extension, something that you can install OS and dont have to remove cause of free space or you need it for something else.

    Cause learning Linux or Centos or anything else needs environment, and virtualbox can work but it wont allow you play with KVM, and thats for me the big part of the fun.

    Also you need to keep learning that means its is process some day you will leave it 4-5 days dormat cause your stuck in an issue the other day bulb lights up mainly due to reading this site and you get back on it.

  • 1 Votes
    18 Posts
    4k Views
    JaredBuschJ

    @scottalanmiller said in Out of Band Management - does it mean no keyboard at all:

    @JaredBusch said in Out of Band Management - does it mean no keyboard at all:

    @scottalanmiller said in Out of Band Management - does it mean no keyboard at all:

    @Carnival-Boy said in Out of Band Management - does it mean no keyboard at all:

    Well, I'm glad that's been cleared up. You can probably delete the thread now 🙂

    I don't even know what the original thread was!

    And that is why you have no concept of what you posted being completely wrong for the context of the thread.

    Honestly, it is pretty straight forward if you read the first post.
    https://mangolassi.it/topic/13595/out-of-band-management-does-it-mean-no-keyboard-at-all

    The first post also contains links back to the thread that @DustinB3403 pulled this from.

    I was responding the post quoted, though.

    Which was in the context of the entire thread. If you want to cherry pick something, then clearly, state as much. You did not.

  • Thinking about scheduling CISSP really soon, maybe this week...

    6
    0 Votes
    6 Posts
    462 Views
    IRJI

    I get 100% reimbursement from my company on the passing attempt. So if I pass the first time, I will get 100% back.

  • SOHO Router Equipment

    64
    2 Votes
    64 Posts
    19k Views
    JaredBuschJ

    @Dashrender said in SOHO Router Equipment:

    Are you saying that the UNMS isn't basically the same thing?

    It is completely not the same thing.

  • 3 Votes
    9 Posts
    4k Views
    scottalanmillerS

    @dafyre said in Linux: YUM Package Management:

    @scottalanmiller said in Linux: YUM Package Management:

    @NerdyDad said in Linux: YUM Package Management:

    As of CentOS 7, DNF isn't even an option. Yum is the only thing to use.
    0_1493674214761_dnf.PNG

    Correct. But it has been in fedora for a while now.

    Is dnf the default in Fedora now?

    Yes

  • Clarifying Symbolic Links

    25
    0 Votes
    25 Posts
    2k Views
    stacksofplatesS

    @wirestyle22 said in Clarifying Symbolic Links:

    @scottalanmiller said in Clarifying Symbolic Links:

    @wirestyle22 said in Clarifying Symbolic Links:

    I understand what you're saying, I'm speaking totally in regards to the configuration of a piece of software, not accessing a program.

    Why pick that one use case?

    I'm trying to understand the use case: Windows vs. Linux. It makes more sense to me to use a shortcut in a GUI, but what is the use case for the CLI?

    Here is a real world example. The corporate IT guys are using something called Useful. It displays images through a zero client attached to a TV. We mounted a share to the server and made a soft link to the directory in the share. Useful looks at the soft link for images and sees whatever is in the share.

  • Strongarm.io hosting the St Louis SpiceCorp

    20
    0 Votes
    20 Posts
    3k Views
    scottalanmillerS

    Really I meant less it's ohysical look and more your impression of its value and potential 🙂

  • 0 Votes
    6 Posts
    3k Views
    scottalanmillerS

    That's why we switched to running it on Ubuntu with Snaps. Runs great.

  • How do I setup TLS on a Postfix relay

    Solved
    6
    2 Votes
    6 Posts
    2k Views
    NashBrydgesN

    @JaredBusch Awesome. Tks Jared. Tested and works beautifully!

  • CentOS 7 UIDs

    9
    1 Votes
    9 Posts
    2k Views
    stacksofplatesS

    All of the RHEL/CentOS 7 stuff I've used has started at 1000. Identity Management sets users in a random range around 1,000,000,000.

  • AD certs

    21
    0 Votes
    21 Posts
    2k Views
    Mike DavisM

    There is a bit of a delay since the admin had other services running on his domain controller. He has a SQL that he has to address before he can reboot the other domain controller. I got AD replicating between the domain controllers and DHCP/DNS working properly, but as far as the AD certs, I'm bowing out of this one at this point. I don't know enough about the underpinnings to know how to test it properly since an attempt to set it up was botched halfway through.

    I'll be interested to hear myself how it is resolved.

  • Black Screen w/ white cursor after login on one user profile

    3
    1 Votes
    3 Posts
    489 Views
    F

    Sorry, Yes, it's Windows 10, connected to a domain.

  • Adventures into Learning CentOS 7

    2
    4 Votes
    2 Posts
    1k Views
  • XenServer 7 install not working for SD-Card setup

    42
    2 Votes
    42 Posts
    7k Views
    travisdh1T

    @guyinpv said in XenServer 7 install not working for SD-Card setup:

    @travisdh1 said in XenServer 7 install not working for SD-Card setup:

    @guyinpv said in XenServer 7 install not working for SD-Card setup:

    @momurda said in XenServer 7 install not working for SD-Card setup:

    @guyinpv From the storage tab while a vm is selected in XenCenter, Click on Attach Disk. choose the disk from your list of SR.

    The only thing in this menu is "Local storage" and "Removable storage".

    The VHD files I have are not located on the local storage media, they are on my NAS backup device.

    Somehow I have to get the VHD files off the NAS and imported into the existing VMs.

    I'm not sure how to do this off the top of my head in XenOrchestra (me=fail). How I got my XO back was by using XenCenter. Have the VHD files available on the local machine, and then go to file -> import inside of XenCenter, and select one of the VHD files. You'll then get the normal vm creation questions, but without the storage creation. You should be good to go after the import.

    Sounds reasonable. Then I just have to figure out how to copy the files onto the server local storage. There is no general "file browser" in XC where I can just copy files from the network.

    The import takes care of that for you, you don't have to copy any files to XenServer yourself.

  • SSO between two websites

    12
    0 Votes
    12 Posts
    2k Views
    DustinB3403D

    So the existing website is built on DNN, which Bitium has a SAML SSO solution which may work for this.

    Still investigating.